Sciweavers

16070 search results - page 64 / 3214
» Identifying
Sort
View
139
Voted
MSR
2006
ACM
15 years 9 months ago
Using software birthmarks to identify similar classes and major functionalities
Software birthmarks are unique and native characteristics of every software component. Two components having similar birthmarks indicate that they are similar in functionality, st...
Takeshi Kakimoto, Akito Monden, Yasutaka Kamei, Ha...
122
Voted
MINENET
2005
ACM
15 years 9 months ago
Identifying BGP routing table transfers
BGP routing updates collected by monitoring projects such as RouteViews and RIPE have been a vital source to our understanding of the global routing system. The updates logged by ...
Beichuan Zhang, Vamsi Kambhampati, Mohit Lad, Dani...
154
Voted
BIBM
2009
IEEE
172views Bioinformatics» more  BIBM 2009»
15 years 8 months ago
Identifying Gene Signatures from Cancer Progression Data Using Ordinal Analysis
—A comprehensive understanding of cancer progression may shed light on genetic and molecular mechanisms of oncogenesis, and it may provide much needed information for effective d...
Yoon Soo Pyon, Jing Li
122
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
138
Voted
MSR
2010
ACM
15 years 5 months ago
Identifying security bug reports via text mining: An industrial case study
-- A bug-tracking system such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams, testing teams, and end users. When bug reporters subm...
Michael Gegick, Pete Rotella, Tao Xie